Future of Sourcing - Digital Risk Protection http://futureofsourcing.com/tags/digital-risk-protection en Why Cybersecurity Outsourcing Continues to Grow http://futureofsourcing.com/why-cybersecurity-outsourcing-continues-to-grow <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://futureofsourcing.com/sites/default/files/articles/Why%20Cybersecurity%20Outsourcing%20Continues%20to%20Grow%20in%202021.png"><a href="http://futureofsourcing.com/sites/default/files/articles/Why%20Cybersecurity%20Outsourcing%20Continues%20to%20Grow%20in%202021.png" title="Why Cybersecurity Outsourcing Continues to Grow" class="colorbox" rel="gallery-node-1987-BJkLFL-Daz0"><img typeof="foaf:Image" src="http://futureofsourcing.com/sites/default/files/styles/juicebox_medium/public/articles/Why%20Cybersecurity%20Outsourcing%20Continues%20to%20Grow%20in%202021.png?itok=kneWG9iy" width="624" height="325" alt="" title="" /></a></div></div></div><div class="field field-name-field-intro field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"> <h1>Why Cybersecurity Outsourcing Continues to Grow</h1> </div></div></div><div class="field field-name-field-related-news field-type-entityreference field-label-above"><div class="field-label">Related news:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/responsible-infosec-is-the-hot-new-purpose">Responsible InfoSec is the Hot New Purpose</a></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"> <p>After a bumper crop of cyber incidents last year, 2021 is seeing more small businesses turn to outsourced providers for security services than ever. 2020 saw a <a href="https://www.itpro.co.uk/security/cyber-attacks/358276/2020-the-busiest-year-on-record-for-cyber-attacks-against-uk-firms" target="_blank">20% growth</a> in hacking attempts faced by U.K. businesses, made worse by an increase in attack complexity. <a href="https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/" target="_blank">Microsoft recently reported</a> how multi-stage credential phishing and ransomware methods became the most popular attack technique in 2020. Businesses must take action, but a global shortage of cybersecurity resources means tough choices.</p> <p>To solve this problem, firms have turned to Managed Service Providers (MSPs) to protect their infrastructure and sensitive data. Specialists can give round-the-clock protection to a standard that can&rsquo;t be replicated in-house and <a href="https://skurio.com/press/skurio-research-reveals-latest-trends-in-cybersecurity-challenges/" target="_blank">Skurio&rsquo;s research</a> found that more than half of all organisations now outsource their cybersecurity in this way.</p> <h2>A Complex Challenge</h2> <p>Managing cybersecurity at scale is demanding. Modern IT ecosystems provide multiple attack paths for cybercriminals to exploit. From an unpatched application to a user with poor password management, just one gap is enough to allow a serious attack. Good software patching and password hygiene can mitigate some cyber risks but changing techniques require specialist skills.</p> <p>The COVID pandemic provided new opportunities to cybercriminals. <a href="https://www.ncsc.gov.uk/news/annual-review-2020" target="_blank">The NCSC revealed</a> that a third of the incidents it handled in 2020 were related to the coronavirus. Criminals exploited the widespread disruption and preyed on individuals&rsquo; fears, frequently using COVID-related topics used as a smokescreen for phishing.</p> <p>In the most extreme example, <a href="https://www.avanan.com/blog/biontech-covid-vaccine-spoofed" target="_blank">criminals impersonated a BioNTech executive</a>, appearing to offer early access for ordering vaccine and test kits. The elaborate business email compromise attack replicated company branding and even included a photo and signature of the individual.</p> <p>Wider use of VPN technology to support remote working, prompted the U.S. Department of Homeland Security&#39;s Cybersecurity and Infrastructure Security Agency (CISA) to issue vulnerability warnings for two major suppliers and predict that unpatched <a href="https://www.ciodive.com/news/vpn-vulnerabilities-dhs-cyber-awareness/578028/" target="_blank">VPNs would become the top exploitable security flaw in 2020</a>. Further bad news for VPN users has emerged this year with three popular Android based <a href="https://www.vpncompare.co.uk/android-vpn-apps-hacked/" target="_blank">VPNs allegedly suffering data breaches</a>.</p> <h2>The Talent Drought&nbsp;</h2> <p>The growing demand for cybersecurity personnel has produced a global shortage of qualified practitioners, with <a href="https://www.infosecurity-magazine.com/news/cybersecurity-skills-shortage-tops/" target="_blank">an estimated four million cybersecurity roles unfilled globally</a>. Recruiting experienced security personnel is difficult and beyond the financial reach of many businesses, especially as cybersecurity teams must be on-call to deal with attacks at any time. Finding extra resources to train and develop internal teams can leave security leaders fighting an uphill battle to retain the best talent.&nbsp;</p> <p>For smaller firms, in-house IT personnel are often expected to be jacks of all trades and this includes managing information security in addition to operational tasks. But, in reality, even the most experienced and resourceful IT team can struggle to cope with the threats they&rsquo;re faced with and can lack the necessary tools to see the big picture or implement strategic planning.&nbsp;</p> <h2>A Safe Pair of Hands</h2> <p>If outsourcing IT security is a cost-effective way to harness cyber expertise, there are other benefits too. When these responsibilities are outsourced to specialist Managed Security Service Providers (MSSPs), businesses gain assurance through contracted service level agreements (SLAs). Having metrics and specific results to deliver against also helps secure the confidence of the board and other stakeholders.</p> <p>MSSPs have the first-hand experience of dealing with the latest threats as criminals continue to discover new ways to monetise cybercrime, so businesses can consider them a trusted advisor. Indeed, MSPs that traditionally focus purely on business IT and communications provision are now extending their portfolios to embrace the latest cybersecurity tools and services to meet the demand the Skurio research detected.</p> <h2>Planning for Future Risks</h2> <p>Digital Risk Protection (DRP) has emerged as one of the most useful services in this regard, constantly monitoring&shy;&shy; sites, forums, paste bins, and messaging platforms for insight on trends and potential threats, including Dark Web markets where data and exploit details are shared or traded. Alongside protecting against future attacks, this approach plays a crucial role in detecting previous breaches, an important risk factor.</p> <p>Once a dataset has surfaced, it seldom gets forgotten as compilation breaches continue to be a popular attack vector in brute-force and phishing attacks. Identifying stolen assets posted outside the network can provide a huge advantage in mitigating the reputational and regulatory impact of a breach. Ninety-three percent of IT decision-makers in our research believed external threat monitoring through DRP improves customer trust and loyalty.</p> <p>DRP solutions can also alert companies if new typosquatting domains are registered. Email phishing scams typically rely on diverting unsuspecting people to sites which seem legitimate, where the domain impersonates a site which is of interest to the victim. They are often visited by people who have mistyped the genuine domain URL hence the label: typosquatting.</p> <p>Researching potential threats and breaches on the surface, deep and Dark Web is difficult, time-consuming, and potentially dangerous for an amateur. Eighty percent of respondents in our study said they <a href="https://sig.org/sig-university/certified-intelligent-automation-professional" target="_blank">lack the required skills or knowledge to carry out this type of research</a>. MSPs are, therefore, well-positioned to provide breach detection and threat monitoring services through automated Digital Risk Protection as well as value-added services such as advice, investigation and takedowns.</p> <p>The time has come for in-house IT teams to take stock, evaluate their risks and set out a plan to mitigate them. Without access to specialists that can proactively identify and respond to these risks, businesses will be blind to any threats until it is too late. Outsourcing to specialist security service providers is the safest and fastest way to do this.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-inline clearfix"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even" rel="dc:subject"><a href="/tags/cybersecurity" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Cybersecurity</a></div><div class="field-item odd" rel="dc:subject"><a href="/tags/digital-risk-protection" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Digital Risk Protection</a></div><div class="field-item even" rel="dc:subject"><a href="/tags/information-technology-outsourcing-ito" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Information Technology Outsourcing (ITO)</a></div></div></div><div class="field field-name-field-addthis field-type-addthis field-label-hidden"><div class="field-items"><div class="field-item even"><div class="addthis_toolbox addthis_default_style " addthis:title="Why Cybersecurity Outsourcing Continues to Grow - Future of Sourcing" addthis:url="http://futureofsourcing.com/why-cybersecurity-outsourcing-continues-to-grow"><a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_linkedin"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_facebook"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_twitter"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_googleplus"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_pinterest_share"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_reddit"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_email"></a> <a href="https://www.addthis.com/bookmark.php?v=300" class="addthis_button_print"></a> </div> </div></div></div><div class="field field-name-field-region field-type-taxonomy-term-reference field-label-inline clearfix"><div class="field-label">Region:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/regions/global" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Global</a></div></div></div> Wed, 19 May 2021 02:00:00 +0000 Jeremy Hendy 1987 at http://futureofsourcing.com http://futureofsourcing.com/why-cybersecurity-outsourcing-continues-to-grow#comments